December 2013
-
December 20, 2013
20
Dec'13
Top 10 2013: Most popular governance, risk and compliance articles
In our Top 10 of 2013, read SearchCompliance's most-viewed compliance articles from the past year for advice on deploying a cutting-edge GRC strategy. Continue Reading
-
December 20, 2013
20
Dec'13
GRC professionals' salaries increase as demand for their skills rises
As businesses expand their IT security and compliance focus, GRC professionals are seeing salary increases with their broadened responsibilities. Continue Reading
-
December 20, 2013
20
Dec'13
ARMA 2013: Unique business needs force information governance to adapt
ARMA International's Diane Carlisle discusses how a clear understanding of business processes is vital when incorporating data governance strategy. Continue Reading
-
December 18, 2013
18
Dec'13
Can application performance monitoring tools improve regulatory compliance?
Application performance monitoring has proven beneficial to several areas of IT quality assurance, but can it be trusted with ensuring compliance? Continue Reading
-
December 13, 2013
13
Dec'13
New vulnerability assessment tools proactively detect security threats
Vulnerability assessment tools can help enterprises detect and eliminate security threats early on. Here are some of the newer products on the market. Continue Reading
-
December 13, 2013
13
Dec'13
FASAB (Federal Accounting Standards Advisory Board)
The Federal Accounting Standards Advisory Board (FASAB) is an advisory committee that develops accounting standards for U.S. government agencies. Continue Reading
-
December 13, 2013
13
Dec'13
privacy impact assessment (PIA)
A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization. Continue Reading
-
December 13, 2013
13
Dec'13
ARMA 2013: Tech poses new challenges for records management strategy
In this ARMA 2013 video Q&A, ARMA International's Diane Carlisle discusses how modern technology poses new records management strategy challenges. Continue Reading
-
December 12, 2013
12
Dec'13
Adapt continuous monitoring of data to benefit compliance controls
In this tip, learn how integrating data security continuous monitoring processes with regulatory controls provides big benefits for compliance teams. Continue Reading
-
December 11, 2013
11
Dec'13
A bleak picture of IT security metrics and fighting malicious attacks
Renowned security expert Eugene Spafford discusses the lack of industry advances in identifying IT security metrics and fending off malicious attacks. Continue Reading
-
December 10, 2013
10
Dec'13
FAQ: What changes are afoot under PCI DSS 3.0 requirements?
In this FAQ, learn how new standards under PCI DSS 3.0 are changing the approach of businesses to payment card security and regulatory compliance. Continue Reading
-
December 06, 2013
06
Dec'13
What's on deck for 2014? An updated information security plan
In this video, filmed at the 2013 ISSA International Conference, three security professionals share their information security plan the year to come. Continue Reading
-
December 06, 2013
06
Dec'13
Predictive security intelligence: How it protects today's enterprise
In this Ask the Expert video, security guru Eric Cowperthwaite explains predictive security intelligence and how to leverage it in the enterprise. Continue Reading
-
December 05, 2013
05
Dec'13
Q&A: Adapting data governance strategies to the digital age
Data governance expert Jeffrey Ritter discusses how incorporating modern information management best practices can improve overall business processes. Continue Reading
-
December 03, 2013
03
Dec'13
Free security tools, architecture to help stay ahead of cybercriminals
In this video Q&A, the former CISO of the CIA shares ways companies can use free security and architecture tools to avoid being victims of cybercrime. Continue Reading